09:01:21 executing program 3: statx(0xffffffffffffffff, 0x0, 0x6000, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000), 0x8, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x4) BUG: memory leak unreferenced object 0xffff88800d0eed00 (size 128): comm "syz-executor.1", pid 17396, jiffies 4295377884 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc de46957b): __kmalloc_cache_noprof+0x4a4/0x730 v9fs_init_fs_context+0x49/0x5b0 alloc_fs_context+0x580/0xb20 path_mount+0xd8d/0x2140 __x64_sys_mount+0x293/0x310 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88804cd2a6c0 (size 8): comm "syz-executor.1", pid 17396, jiffies 4295377884 hex dump (first 8 bytes): 6e 6f 62 6f 64 79 00 ff nobody.. backtrace (crc 24a71c4e): __kmalloc_node_track_caller_noprof+0x4df/0x820 kstrdup+0x3e/0xc0 v9fs_init_fs_context+0xf3/0x5b0 alloc_fs_context+0x580/0xb20 path_mount+0xd8d/0x2140 __x64_sys_mount+0x293/0x310 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed